Pseudorandom function family

Results: 36



#Item
21Pseudorandom Functions and Lattices Abhishek Banerjee1 1 Georgia Chris Peikert1 Institute of Technology

Pseudorandom Functions and Lattices Abhishek Banerjee1 1 Georgia Chris Peikert1 Institute of Technology

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:19
22Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF Zvika Brakerski∗ Vinod Vaikuntanathan†

Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF Zvika Brakerski∗ Vinod Vaikuntanathan†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-14 16:12:03
23On the Cryptographic Hardness of Finding a Nash Equilibrium Nir Bitansky∗ Omer Paneth†  Alon Rosen‡

On the Cryptographic Hardness of Finding a Nash Equilibrium Nir Bitansky∗ Omer Paneth† Alon Rosen‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-02 00:16:21
24Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen∗ Shafi Goldwasser†

Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen∗ Shafi Goldwasser†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 04:22:49
25Transport Layer Security (TLS) Bill Burr [removed] June 17, 2002

Transport Layer Security (TLS) Bill Burr [removed] June 17, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
26The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
27Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
28NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
29Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-16 13:57:22
30Lightweight Sponge Stream F-FCSR f -function Analysis  The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48